Automation of Fingerprint Recognition Using OCT Fingerprint Images ()
1. Introduction
Automated or semi-automated recognition of a person is one of the critical issues. Fingerprint recognition is one of the most commonly used methods of biometrics. Every person is known to have unique, immutable series of ridges and furrows on the surface of the finger, called fingerprint [1]. Fingerprint recognition is cheap and relatively robust biometric method and it has been extensively studied and applied for many popular applications. These methods rely on the surface topography of the finger and thus are vulnerable for spoofing with using artificial fingerprint [2-4]. During the past several years, significant improvements have been made by several scientific groups to enhance the robustness of the fingerprint readers based on the recognition of the surface topology. Optical Coherence Tomography (OCT) technique for noninvasive identification of artificial materials used for spoofing. A typical time-domain OCT system is based on the Michelson interferometer configuration with a low coherent laser in a source arm, a moving mirror in a reference arm, an object under study in a sample arm, and a photodetector to measure the interference signal in a detection arm. Due to use of partially coherent light in OCT, speckle noise is an inherent component of any OCT tomogram. Presence of speckle noise results in granular appearance of the image, which in turn can obscure small or low reflectivity features, thus degrading the image quality of OCT tomograms. Furthermore, it can impede or limit the performance of image segmentation and pattern recognition algorithms that are used to extract, analyze, and recognize diagnostically relevant features. In this paper we explain two methods for automation identification of finger gummy with embedded artificial layer. Thus for recognition of artificial layer must be reduce speckle noise. At the first the OCT fingerprint images is enhanced. Image enhancement is containing: noise removal, edge detection and segmentation. The prepared segmented image is scanned for identification of additional layer.
2. Materials and Methods
2.1. Experimental Setup
Figure 1 shows a schematic of a time-domain OCT system used in these studies (Imalux Corp., Cleveland, Ohio). A low-coherent superluminescent laser diode with a wavelength of 1300 ± 15 nm and an output power of 375 µW was used as the optical source in this system. Light in the sample arm of the interferometer was directed into tissues using a single-mode optical fiber and a specially designed miniature endoscopic probe. The endoscopic probe allowed for the latera scanning of the sample surface in the lateral direction (axis). Light scattered from the sample and light reflecte from the reference arm mirror formed an interferogram which was detected by a photodiode.
In-depth scanning was produced electronically by piezoelectric modulation of the fiber length. Two-dimensional images were obtained by scanning over the sample surface in the lateral direction (X axis) and in-depth (Z axis) scanning by the interferometer. The acquired images were 450 × 450 pixels.
Figure 1. Schematic of the OCT system used in these studies. PD, photo detector; ADC, analog-to-digital converter [5].
2.2. Materials
Several materials that could be used for spoofing fingerprint biometric system have been studied. For instance gelatin, silicon, waxes of different concentration. Gelatin sample were prepared by dissolving solid gelatin in water. The solutions were heated and then left out for solidification. There are slices with different thickness. A finger was carefully washed with soap to get rid of the dust and tissue oil. Then, the finger was pressed firmly into the plasticin to leave the fingerprint pattern. Hence the artificial fingerprint dummy was ready for the experiments.
2.3. Experimental Protocol
In the first part of experiment, OCT images of a thumb were taken to obscure characteristics layer of the skin: stratum corneum of epidermis, epidermis, dermis (Figure 2(a)). In the next phase, artificial fingerprint dummy were placed on the finger and OCT image was taken. (Figure 2(b))
2.4. Automation
Automated or semi-automated recognition of a person is the most critical issues. It has been shown the biometric imaging systems based on fingerprint Recognition could be easily spoofed with about $10 Worth of household supplies. Biometric fingerprint devices have to be more secure, accurate and robust.
Against different fraudulent methods including dummy fingerprints. Optical coherence tomography is capable to identification of artificial materials used to swindle fingerprint biometric devices. There is one method for automated recognition of a fingerprint that it is faked or not. This method is scanning of image for finding edge between artificial layer and real skin.
For the scanning of image, the image must be enhanced and segmented to edge between artificial layer and real
(a)(b)
Figure 2. Two dimensional OCT image from (a) finger skin (b) finger with embedded artificial layer.
skin if it is existence, detected. Then the segmented image is prepared to scanning.
2.4.1. Noise Removal
Since OCT is based on low-coherence interferometry, which utilizes the spatial and temporal coherence properties of optical waves backscattered from biological tissue [5]. Due to use of partially coherent light in OCT, speckle noise is an inherent component of any OCT tomogram. Presence of speckle noise results in granular appearance of the image, which in turn can obscure small or low reflectivity features, thus degrading the image quality of OCT tomograms. Furthermore, it can impede or limit the performance of image segmentation and pattern recognition algorithms that are used to extract, analyze, and recognize diagnostically relevant features. Rotating kernel transformation (RKT) [6] were applied to OCT security images to reduce noises.
The RKT technique operates by filtering an image with a set of templates (kernels), and retaining the largest filter output at each pixel. In this technique the input image is convolved with a kernel that is rotated discretely in small steps through 360. The convolution can be written as [7].
(1)
where I is the input image, and Kθ is the kernel oriented at rotation angle θ the maximum values are calculated over all rotated kernels, and the output image is defined as
(2)
RKT were applied to OCT fingerprint images with kernel size: 31. The larger kernel size causes the speckle in the image is blurred and the edges are less visible but we would like to preserve the edge while at the same time reduce the speckle. In addition, we applied the RKT algorithm to the OCT images sequentially two times and result will be better. Thereby, for the best do noising result, were applied RKT with kernel size 31 and it is repeated.
2.4.2. Edge Based Segmentation
After speckle removal for detecting of artificial layer was applied edge detection technique. Vertical gradient is a technique for edge detection. This edge detector was applied to RKT processed image to detect the border between dummy and real skin. in order to decide whether an edge has been found, we applied thresholding for segmentation of image. Thresholding is a common region extraction method. Common thresholding is based on image s histogram. Since this may be computationally expensive, and image histograms may not have clearly defined valley points, often making the selection of an accurate threshold difficult but also we would like to edge detection is automated while this method based on image histogram then for every image amount of thresholding have been changed. Hysteresis thresholding overcomes this limitation. The algorithm uses 2 thresholds, Thigh, Tlow .
• A pixel (x, y) is called strong if intensity amount of (x, y) > Thigh.
• A pixel (x, y) is called weak if intensity amount of (x, y) < Tlow.
• All other pixels are called candidate pixels.
In each position of (x, y), discard the pixel (x, y) if it is weak, output the pixel if it is strong. If the pixel is a candidate, follow the chain of connected local maxima in both directions along the edge, as long as, amount of (x, y) > Tlow. If the starting candidate pixel (x, y) is connected to a strong pixel, output this candidate pixel; otherwise, do not output the candidate pixel.
2.4.3. Scanning of Image for Fingerprint Recognition
When artificial layer (if it is existence) is detected by above algorithm, for automation of this systems must to scan the line (edge between artificial layer and real skin). There is one algorithm for to do it. This algorithm constitutes several steps.
Step 1: the thresholded image is containing unwanted signal that may reduces precision of the process, therefore median filtering was applied to remove them.
Step 2: enhanced image is binary. Middle pixels of images are selected to scanning. Since artificial layer is at middle of image and no need to whole of the image is scanned because it is consuming time.
Step 3: at the first of every row, the entire column of image matrix is scanned; if the white pixel is found for the column the next row is tested if it is white the number of row is saved. it is a loop and continues. All of point was accepted with 1% or 2% tolerance. This algorithm was repeated until the line is detected.
The number of row with 1% or 2% tolerance is the height of artificial layer. If the height is none zero thereby the artificial layer is existence, and fingerprint is faked. But if the height is zero, then the fingerprint is ok.
3. Result
3.1. Noise Removal
Nonlinear filtering such as rotating kernel transformation (RKT) with kernel size 31 was applied to OCT fingerprint images. This filtering with larger kernel size, the speckle in the image is blurred and the artificial layer edge is more clearly emphasized. Figure 3(a) demonstrates applying RKT with kernel size 31 to Figure 2(a). When the RKT application applied to the OCT images, twice, amplifies the effects of a single application and results in even more smoother images. Figure 3(b) shows the results.
3.2. Edge Detection and Image Segmentation
For detecting the boundary of artificial layer and real skin we applied vertical gradient. When, this edge detector were applied to the RKT processed images, detection of edge will be better [8] when vertical gradient were applied to double RKT processed image, detection of line is more visible and the line is continuous. These results are shown in Figure 4. Detection of artificial layer and real skin border by hysteresis thresholding technique is shown in Figure 5. Making the assumption that important edges should be along continuous curves in the image allows us to follow a faint section of a given line and to discard a few noisy pixels that do not constitute a line but have produced large gradients. Therefore we begin by applying a high threshold. These marks out the edges we can be fairly sure are genuine. Starting from these, using the directional information derived earlier, edges can be traced through the image. While tracing an edge, we apply the lower threshold, allowing us to trace faint sections of edges as long as we find a starting point. Figure 5(a) demonstrates result of applying hysteresis thresholding to RKT Processed image. When hysteresis thresholding were applied to twice RKT processed image
(a)(b)
Figure 3. RKT processing applied to Figure 2(b) with kernel size 31, (a) Once application; (b) Twice application.
(a)(b)
Figure 4. Vertical gradient applied to (a) RKT processed image; (b) Twice RKT processed image.
(Figure 5(b)), the result is similar to Figure 5(a). However the detected line is so clear and sharp, but width of its is wide and reduces precision of measurement of height of artificial layer. Figure 5(c) demonstrates result of hysteresis thresholding performed on vertical gradient of RKT with kernel size 31 processed image, the detected edge is better since it is sharp and one pixel width, thereby measurement of additional layer is precision.
Figure 5(d) demonstrates result of applying hysteresis thresholding to vertical gradient twice RKT with kernel size 31 since double RKT application preserves most of features, therefore when hysteresis thresholding applied to it, despite detection of middle edge, also the features of image will be revealed. That is no optimal for automation.